91.113 Exploring the Internet. Lecture 10. Personal Safety Online. Instructor: Beibei Yang Department of Computer Science University of Massachusetts Lowell. Some slides courtesy of Michael Krolak and Patrick Krolak. Meet “Little Fatty”, an Internet celebrity in China. Taking Charge.
Instructor: Beibei Yang
Department of Computer Science
University of Massachusetts Lowell
Some slides courtesy of Michael Krolak and Patrick Krolak
Comcast AUP: http://www.comcast.com/policies/
From: UML NEW EMAIL <[email protected]>
Date: Wed, Jul 7, 2010 at 2:28 AM
Subject: Re UNIVERSITY I.T.S UPDATE
Welcome to the university of Massachusetts Lowell New webmail system.
Many of you have given us suggestions about how to make the Umass Lowell webmail better and we have listened.This is our continuing effort to provide you with the best email services and prevent the rate of spam messages received in your inbox folder daily .Consequently all in-active old email accounts will be deleted during the upgrade.
To prevent your account from deletion and or being suspended we recommends all email accounts owner users to upgrade to the new email. Fill in your data in the blank space provided;
(Email:_______), (User I.D_______), (password_______) (Retype
The University I.T.S
Checked by AVG - Version: 8.5.437 / Virus Database: 271.1.1/2840 - Release
Beast, a Windows-based backdoor Trojan horse
Junk email – unwanted, resource robbing, and often contains viruses, worms, and scams.
Spam is the fastest growing component of messages on the Internet that consumes bandwidth, storage, and angers the user. ISPs and some consumer groups are attempting to shut down the worst offenders.
Spam as harassment.
Spam as DoS (Denial of Service) attack.
Spam as Phishing (attempt to obtain a person’s ID, password, etc, by pretending to be a legitimate request.)
data, control messages
Q: What can a “bad guy” do?
A: A lot!
Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers.
break into hosts around the network (see malware)
send packets toward target from compromised hosts
src:B dest:A payloadMasquerade as you
src:B dest:A user: B; password: foo
We examine cases that illustrate particularly egregious examples of cyber bullying and cyber crime.
Sometimes the voice of youth is compelling caution to other youths.